US20030064720A1 - System and method for generating communication network performance alarms - Google Patents

System and method for generating communication network performance alarms Download PDF

Info

Publication number
US20030064720A1
US20030064720A1 US09/971,305 US97130501A US2003064720A1 US 20030064720 A1 US20030064720 A1 US 20030064720A1 US 97130501 A US97130501 A US 97130501A US 2003064720 A1 US2003064720 A1 US 2003064720A1
Authority
US
United States
Prior art keywords
event
alarm
network
test
network entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/971,305
Inventor
Daniel Valins
Todd Ruth
Philip Cochran
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US09/971,305 priority Critical patent/US20030064720A1/en
Assigned to TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) reassignment TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: COCHRAN, PHILIP, RUTH, TODD, VALINS, DANIEL
Publication of US20030064720A1 publication Critical patent/US20030064720A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements

Definitions

  • the present invention generally relates to communication networks, and particularly relates to statistically based performance alarm generation within such systems.
  • Communication systems such as wireless communication networks used in cellular radio systems, are complex aggregations of interdependent entities, with each entity playing a role in the overall functionality of the system.
  • RBSs radio base stations
  • BSCs Base station controllers
  • BSCs provide control and management of the RBSs, and route call traffic and other operational information to and from other entities within the network.
  • performance monitoring identifies network operations experiencing unacceptably high failure or problem rates.
  • a BSC experiencing high dropped call rates or an inordinate number of call handoff failures represent typical network problems of keen interest to personnel responsible for overseeing network operations.
  • the present invention comprises methods and apparatus for performance monitoring and alarm generation within a wireless communication network based on statistical processing techniques that obviate the need for historical data and allow near real-time alarm generation.
  • Event outcomes (success or failure) for a monitored event type are accumulated as a set of Bernoulli trials to form a sample set.
  • the binomial distribution of the sample set is approximated as a Normal or Student's T distribution, on which basis inferential statistical processing is used to determine whether the sample set indicates that a general failure rate of the event type exceeds defined alarm thresholds. If the alarm threshold is exceeded, an alarm for that event type is generated.
  • Inferential statistical processing in the above approach may entail performing a one or two tailed t-test (or z-score test) using the sample set, and may make use of an essentially arbitrary confidence interval that allows alarm generation to be reliable within a desired degree of confidence. Moreover, by estimating selected statistical parameters for the sample set, such as standard deviation, rather than relying on analysis of historic data or large sample sets of accumulated data, the present invention provides fast and reliable alarm generation.
  • Eliminating the need for accumulating large data sets allows at least some performance monitoring and alarm generation to move from centralized network management entities and into other network entities directly supporting call processing, such as the base station controllers (BSCs) or radio base stations (RBSs), where such monitoring would otherwise be impractical.
  • BSCs base station controllers
  • RBSs radio base stations
  • This type of local alarm generation avoids the potential delays associated with forwarding call event data for multiple intervals to a centralized network manager for analysis.
  • the present invention may coexist with or be part of such centralized monitoring and reporting systems.
  • FIG. 1 is a diagram of an exemplary communication network.
  • FIG. 2 is a diagram of exemplary logic flow for one embodiment of the present invention.
  • FIG. 3 is a diagram of exemplary logic flow for another embodiment of the present invention.
  • FIG. 4 is a graph of the areas of interest involved in t testing.
  • FIG. 1 is a diagram of an exemplary wireless communication network generally referred to by the numeral 10 , in which one or more embodiments of the present invention may be practiced.
  • the network 10 comprises one or more base station controllers (BSCs) 12 , a plurality of radio base stations (RBSs) 14 supporting wireless communication with access terminals (ATs) 16 , an intra-entity network 18 , a network manager 20 , and a network performance reporting system 22 .
  • BSCs base station controllers
  • RBSs radio base stations
  • ATs access terminals
  • ATDs access terminals
  • network manager 20 a network performance reporting system 22
  • the network 10 practically comprises additional entities not shown in this simplified model.
  • typical network entities such as mobile switching centers (MSCs) or packet control functions (PCFs) supporting communication between the BSC 12 and external networks, are not shown in the interest of simplicity.
  • MSCs mobile switching centers
  • PCFs packet control functions
  • the BSC 12 manages the RBSs 14 , which RBSs 14 provide support for radio frequency communication with a plurality of wireless access terminals (ATs) 16 .
  • the BSC 12 cooperates with network entities not illustrated to route communication traffic to and from the ATs 16 .
  • Many aspects of the network's performance and the status of various network components are of significant interest to network operators. When performance falls short of acceptable levels, or when a status condition is violated, network operators understandably desire notification of such circumstances, preferably with an alarm signal.
  • a broad category of possible network alarms concerns system or device status. In this category, one might include device-centric alarms such as “power supply failure” or “cabinet door open” alarms.
  • the RBSs 14 , the BSCs 12 and other network entities may have a number of possible alarm conditions associated with the integrity or operational status of their various components and subsystems.
  • network entities such as the BSC 12 record these kinds of alarms and report them immediately to the network manager 20 , for example.
  • a different class of alarms arises from the failure of one or more portions of the network to meet performance targets. Of course, these performance failures may ultimately relate back to one or more device failures.
  • the BSC 12 may report one or more classes of events to the network manager 24 , which may accumulate and analyze these events over potentially long time-periods. Often, the reporting system 22 assists the network manager 24 in these analyses, or in fact performs the analyses for the network manager 20 .
  • the communication network 10 may generate performance alarms in the following manner.
  • Raw performance data associated with the BSC 12 and the RBSs 14 may be accumulated by the BSC 12 over regular intervals of fifteen minutes for example.
  • the BSC 12 reports accumulated performance data to the network manager 20 .
  • Transfer of performance data between the BSC 12 and the network manager 20 is generally accomplished through the intra-entity network 18 , which may be an IP-based network, an IS-41 network, or be based on some other standard determined by the requirements or applicable standards of the network 10 .
  • raw performance data represents call processing and other types of events associated with network operation.
  • the BSC 12 might track how many call attempts it processed over the last reporting interval, and what number of those attempts was unsuccessful.
  • Other likely performance events of interest include but are not limited to call handoffs and dropped calls, wherein the BSC 12 reports the overall number of events and the outcomes of those sets of events.
  • the BSC 12 might provide raw performance data to the network manager 10 regarding one or more types of communication network events.
  • the network manager 20 comprising in simplified form a processor 24 and associated memory 26 , holds certain information in support of performance monitoring and alarm generation.
  • the network manager's memory 26 may hold alarm criteria representing failure alarm thresholds for one or more event types, alarm data collected from various reporting network entities, and historical performance data representing multiple, accumulated sets of performance event data from the BSC 12 , for example.
  • the network manager 20 might perform some type of trending or other statistical analysis to determine whether the operation of the network 10 meets defined performance criteria.
  • the network operator may desire an alarm if the incidence of call attempt failures rises above twenty-percent at the BSC 12 . Processing the historical records containing raw event data for call attempts allows the network manager to determine if the observed incidence of call attempt failures exceeds the alarm threshold.
  • the network manager 20 relies on the reporting system 22 to perform this type of analysis.
  • the reporting system 22 generally contains its own processing and memory resources sufficient to process and store historical performance data and alarm criteria transferred from the network manager 20 .
  • One advantage of this arrangement is the offloading of the significant processing time associated with operating on potentially large accumulated event data sets, thus freeing the network manager 20 to pursue other tasks.
  • performance alarms are reliably generated using only a small number of events within a current sample set.
  • alarm generation is more timely and practical for implementation in network entities ill suited for accumulating large data sets or for keeping historical performance data.
  • the need for generating large data sets is avoided by performing a unique series of statistical processing steps on a relatively small data set of event outcomes. For example, event outcomes may be accumulated over a relatively short period, such as during the standard alarm reporting intervals of the BSC 12 discussed earlier.
  • Each event outcome is binary valued, being evaluated on a pass/fail basis.
  • a series of event outcomes for a given type of communication event represents a set of Bernoulli trials that may be evaluated to determine if the incidence of failure observed within the sample set represents a violation of the defined alarm threshold failure probability p 0 .
  • This evaluation involves inferential statistical testing, exemplified by the Student's t-test or the similar z-score test.
  • a set of Bernoulli trials has an inherently binomial distribution but this distribution may be approximated as a normal distribution if several criteria are met.
  • FIG. 2 illustrates an exemplary approach to practicing the present invention.
  • Processing starts (step 100 ) by appropriately setting the null and alternative hypotheses for t-test evaluation (step 102 ).
  • the null hypothesis H 0 might be framed as p i ⁇ p 0 .
  • p i represents the probability of failure inferred from processing the sample set of event outcomes.
  • the alternative hypothesis H 1 might be framed as p i >p 0 .
  • alarm generation entails accumulating a relatively small sample set of event outcomes and then inferring from that data the overall failure rate of the corresponding event type.
  • This approach requires approximating the binomial distribution of the sample set as a normal distribution.
  • one technique determines whether the sample set accumulated thus would allow such approximation by checking N ⁇ p>5, and N ⁇ (1 ⁇ p)>5 (step 104 ). If not, one or more additional events are accumulated (step 106 ), and the test conditions are re-checked. Processing may continue in this manner until enough event outcomes to satisfy the normal-curve approximation requirements are accumulated.
  • the confidence interval may be arbitrarily set by the network operator, but an exemplary value might be ninety-five percent (0.95) for reliable alarm generation. In practice, the confidence interval may be a configurable value set as needed or desired by the network operator.
  • the confidence interval may be expressed as,
  • represents the value of interest
  • s m equals the estimated standard deviation
  • t equals the Student's t value
  • FIG. 4 illustrates the areas of interest under the normal curve associated with the two-tailed t-test.
  • a one- or two-tailed t-test may be performed, or that the similar z-score test may be performed with subsequent evaluations based on the z statistic rather than the t statistic.
  • Other formulas are available for computing the t statistic and it should be understood that the processor 30 in the BSC 12 (or other processor elsewhere in the network 10 ) may calculate the t statistic, or obtain it using table look-up methods. With the table look-up approach, the required statistical table or tables may be stored in memory 32 or elsewhere.
  • Processing then continues with evaluation of the null hypothesis H 0 (step 110 ). If the null hypothesis is accepted, one can conclude that the observed failure rate in the sample set is consistent with the proposition that the overall failure rate for the event type of interest is below the alarm threshold set by the network operator. Conversely, if the null hypothesis is rejected, one can infer that the overall failure rate exceeds the threshold value.
  • the query is 0.39>0.20? The obvious answer is yes, meaning that the null hypothesis H 0 is rejected (step 112 ). Processing then continues with the BSC 12 setting an alarm indicator or otherwise generating alarm information (step 116 ). Processing may then return to a calling program or function (step 118 ). Alarm processing may begin again after a desired interval, or when a controlling program within the BSC software requests it.
  • Type 1 Rejecting the null hypothesis H 0 when it should have been accepted is termed a “Type 1” statistical error.
  • the probability of committing a Type 1 statistical error may be limited based on selection of the desired significance level or confidence interval as used in the above t- or z-score testing. Adopting an exemplary confidence interval of ninety-five percent reduces Type 1 errors to no more than 2.5 percent.
  • the BSC 12 might clear any current alarm data for the corresponding event type, as well as clear the current the sample set so that the next alarm evaluation is based on newly accumulated event outcomes. Note that clearing current alarm data does not necessarily entail clearing any older alarm data for the event type that might be stored in memory 32 .
  • the performance alarm information may be stored as part of the alarm data held in memory 32 and reported to the network manager 20 at the next regular alarm-reporting interval.
  • the BSC 12 might immediately report the alarm condition to the network manager 20 , or other appropriate supervisory network entity.
  • the manner in which the BSC 12 chooses to report the performance alarm information may be configurable. For example, the network operator may implement alarm generation according to the above logic for a plurality of different network event types. Some event types may have a higher criticality associated with them, and thus might warrant immediate transfer of alarm information from the BSC 12 to the network manager 20 . Other less critical event types might have corresponding alarm conditions reported at some predefined reporting interval.
  • the alarm generation techniques of the present invention may be practicably implemented in one or more of a variety of network entities, including BSCs 12 , network managers 20 , and RBSs 14 .
  • different types of entities may generate performance alarms for different types of communication network events, depending upon which entity is best suited or positioned for monitoring a particular type of event.
  • many of the values used in the exemplary equations above are essentially arbitrary.
  • alarm thresholds and other variables may be set or adjusted as needed or desired in a particular circumstance.
  • the above details are exemplary and should not be construed as limiting the scope of the present invention. Indeed, the present invention is limited only by the following claims and the reasonable equivalents thereof.

Abstract

Statistical processing of event outcomes, such as call attempts or handoff attempts, allows reliable generation of performance alarms within a communication network without requiring analysis of historic performance data. Base station controllers might implement such statistical processing so that the controllers themselves rather than other, further removed network management entities generate performance alarms. Attendant advantages include but are not limited to relatively fast and reliable alarm generation using relatively small sample sets. These and other advantages permit detecting and reporting performance alarm conditions more quickly without sacrificing alarm generation reliability.

Description

    BACKGROUND OF THE INVENTION
  • The present invention generally relates to communication networks, and particularly relates to statistically based performance alarm generation within such systems. [0001]
  • Communication systems, such as wireless communication networks used in cellular radio systems, are complex aggregations of interdependent entities, with each entity playing a role in the overall functionality of the system. For example, in a wireless communication system, radio base stations (RBSs) provide radio resources that support RF signaling between access terminals and the network. Base station controllers (BSCs), as suggested by the name, provide control and management of the RBSs, and route call traffic and other operational information to and from other entities within the network. [0002]
  • Traditionally, these other network entities include network management entities, which oftentimes accumulate performance or operational data from elsewhere in the network, such as from one or more BSCs within the network. Performance monitoring typically requires processing this historic data and, in some instances, comparing current results to past results. Trend analysis thus provides a basis for assessing the operational health of the network in question, and may provide valuable insight into the overall efficiency and reliability of the network. [0003]
  • Of more immediate value, performance monitoring identifies network operations experiencing unacceptably high failure or problem rates. A BSC experiencing high dropped call rates or an inordinate number of call handoff failures represent typical network problems of keen interest to personnel responsible for overseeing network operations. [0004]
  • Several challenges arise in the context of performance monitoring and alarm generation as might be used to identify and indicate the BSC problems above. First, data analysis underlying identification of the performance problem must be reliable, yet allow for relatively quick identification of the problem. One approach to reliability uses trending where historic data records are accumulated from relevant performance data over multiple and sometimes lengthy intervals of time. Processing of this historic data allows determination of performance characteristics, such as event failures, for the network operations associated with the data. [0005]
  • However, certain drawbacks accompany performance monitoring that relies on historical data. These drawbacks include relatively long lag times between the beginning of a performance problem and its identification via historic record-based performance monitoring. Further disadvantages include the need for relatively sizeable amounts of storage space to accommodate the historic record. Storage needs are exacerbated by the tendency of network operators to monitor a number of network event types. [0006]
  • SUMMARY OF THE INVENTION
  • The present invention comprises methods and apparatus for performance monitoring and alarm generation within a wireless communication network based on statistical processing techniques that obviate the need for historical data and allow near real-time alarm generation. Event outcomes (success or failure) for a monitored event type are accumulated as a set of Bernoulli trials to form a sample set. The binomial distribution of the sample set is approximated as a Normal or Student's T distribution, on which basis inferential statistical processing is used to determine whether the sample set indicates that a general failure rate of the event type exceeds defined alarm thresholds. If the alarm threshold is exceeded, an alarm for that event type is generated. [0007]
  • Inferential statistical processing in the above approach may entail performing a one or two tailed t-test (or z-score test) using the sample set, and may make use of an essentially arbitrary confidence interval that allows alarm generation to be reliable within a desired degree of confidence. Moreover, by estimating selected statistical parameters for the sample set, such as standard deviation, rather than relying on analysis of historic data or large sample sets of accumulated data, the present invention provides fast and reliable alarm generation. [0008]
  • Eliminating the need for accumulating large data sets allows at least some performance monitoring and alarm generation to move from centralized network management entities and into other network entities directly supporting call processing, such as the base station controllers (BSCs) or radio base stations (RBSs), where such monitoring would otherwise be impractical. This type of local alarm generation avoids the potential delays associated with forwarding call event data for multiple intervals to a centralized network manager for analysis. However, the present invention may coexist with or be part of such centralized monitoring and reporting systems.[0009]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a diagram of an exemplary communication network. [0010]
  • FIG. 2 is a diagram of exemplary logic flow for one embodiment of the present invention. [0011]
  • FIG. 3 is a diagram of exemplary logic flow for another embodiment of the present invention. [0012]
  • FIG. 4 is a graph of the areas of interest involved in t testing. [0013]
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 1 is a diagram of an exemplary wireless communication network generally referred to by the [0014] numeral 10, in which one or more embodiments of the present invention may be practiced. The network 10 comprises one or more base station controllers (BSCs) 12, a plurality of radio base stations (RBSs) 14 supporting wireless communication with access terminals (ATs) 16, an intra-entity network 18, a network manager 20, and a network performance reporting system 22. It should be understood that the network 10 practically comprises additional entities not shown in this simplified model. For example, typical network entities, such as mobile switching centers (MSCs) or packet control functions (PCFs) supporting communication between the BSC 12 and external networks, are not shown in the interest of simplicity.
  • The [0015] BSC 12 manages the RBSs 14, which RBSs 14 provide support for radio frequency communication with a plurality of wireless access terminals (ATs) 16. In turn, the BSC 12 cooperates with network entities not illustrated to route communication traffic to and from the ATs 16. Many aspects of the network's performance and the status of various network components are of significant interest to network operators. When performance falls short of acceptable levels, or when a status condition is violated, network operators understandably desire notification of such circumstances, preferably with an alarm signal.
  • When discussing alarm generation, it is first helpful to discuss in general the range of events and circumstances giving rise to alarm conditions. A broad category of possible network alarms concerns system or device status. In this category, one might include device-centric alarms such as “power supply failure” or “cabinet door open” alarms. Thus, the [0016] RBSs 14, the BSCs 12 and other network entities may have a number of possible alarm conditions associated with the integrity or operational status of their various components and subsystems. Usually, network entities such as the BSC 12 record these kinds of alarms and report them immediately to the network manager 20, for example.
  • A different class of alarms arises from the failure of one or more portions of the network to meet performance targets. Of course, these performance failures may ultimately relate back to one or more device failures. Traditionally, several network entities are involved in performance-based alarm generation. For example, the [0017] BSC 12 may report one or more classes of events to the network manager 24, which may accumulate and analyze these events over potentially long time-periods. Often, the reporting system 22 assists the network manager 24 in these analyses, or in fact performs the analyses for the network manager 20.
  • With the above framework in mind, the [0018] communication network 10 may generate performance alarms in the following manner. Raw performance data associated with the BSC 12 and the RBSs 14, and perhaps other entities not shown, may be accumulated by the BSC 12 over regular intervals of fifteen minutes for example. At the end of each performance data reporting interval, the BSC 12 reports accumulated performance data to the network manager 20. Transfer of performance data between the BSC 12 and the network manager 20 is generally accomplished through the intra-entity network 18, which may be an IP-based network, an IS-41 network, or be based on some other standard determined by the requirements or applicable standards of the network 10.
  • Here, raw performance data represents call processing and other types of events associated with network operation. For example, the [0019] BSC 12 might track how many call attempts it processed over the last reporting interval, and what number of those attempts was unsuccessful. Other likely performance events of interest include but are not limited to call handoffs and dropped calls, wherein the BSC 12 reports the overall number of events and the outcomes of those sets of events. Thus, the BSC 12 might provide raw performance data to the network manager 10 regarding one or more types of communication network events.
  • The [0020] network manager 20, comprising in simplified form a processor 24 and associated memory 26, holds certain information in support of performance monitoring and alarm generation. For example, the network manager's memory 26 may hold alarm criteria representing failure alarm thresholds for one or more event types, alarm data collected from various reporting network entities, and historical performance data representing multiple, accumulated sets of performance event data from the BSC 12, for example.
  • Using these historical records, the [0021] network manager 20 might perform some type of trending or other statistical analysis to determine whether the operation of the network 10 meets defined performance criteria. As an example, the network operator may desire an alarm if the incidence of call attempt failures rises above twenty-percent at the BSC 12. Processing the historical records containing raw event data for call attempts allows the network manager to determine if the observed incidence of call attempt failures exceeds the alarm threshold.
  • More commonly, however, the [0022] network manager 20 relies on the reporting system 22 to perform this type of analysis. Thus, the reporting system 22 generally contains its own processing and memory resources sufficient to process and store historical performance data and alarm criteria transferred from the network manager 20. One advantage of this arrangement is the offloading of the significant processing time associated with operating on potentially large accumulated event data sets, thus freeing the network manager 20 to pursue other tasks.
  • While such analyses have value in terms of providing longer-term trend views of network operating statistics for report generation, they have disadvantages with regard to alarm generation. For example, if the [0023] network manager 20 or its associated reporting system 22 generates performance alarms, such generation is necessarily delayed by the minimum processing intervals of those systems. Because of the amount of historical performance data typically involved in the analyses, there may be an appreciable delay in processing cycles and, therefore, in performance alarm generation.
  • With the present invention, performance alarms are reliably generated using only a small number of events within a current sample set. By avoiding the use of historical performance data, alarm generation is more timely and practical for implementation in network entities ill suited for accumulating large data sets or for keeping historical performance data. The need for generating large data sets is avoided by performing a unique series of statistical processing steps on a relatively small data set of event outcomes. For example, event outcomes may be accumulated over a relatively short period, such as during the standard alarm reporting intervals of the [0024] BSC 12 discussed earlier.
  • Each event outcome is binary valued, being evaluated on a pass/fail basis. Thus, a series of event outcomes for a given type of communication event represents a set of Bernoulli trials that may be evaluated to determine if the incidence of failure observed within the sample set represents a violation of the defined alarm threshold failure probability p[0025] 0. This evaluation involves inferential statistical testing, exemplified by the Student's t-test or the similar z-score test. A set of Bernoulli trials has an inherently binomial distribution but this distribution may be approximated as a normal distribution if several criteria are met.
  • For a sample set of N Bernoulli trials, where X equals the number of failures within the sample set and p equals the observed failure rate (probability) associated with the event type represented by the sample set, the normal-curve approximation is appropriate when, [0026]
  • N·p>5,   (1)
  • and [0027]
  • (1−p)>5,   (2)
  • where [0028] p = X N .
    Figure US20030064720A1-20030403-M00001
  • In the context of the above assumptions and goals, FIG. 2 illustrates an exemplary approach to practicing the present invention. Processing starts (step [0029] 100) by appropriately setting the null and alternative hypotheses for t-test evaluation (step 102). For example, assume the network operator desires alarm generation when the overall incidence of dropped calls meets or exceeds twenty percent at BSC 12 (i.e., p0=0.2). The null hypothesis H0 might be framed as pi<p0. Here, pi represents the probability of failure inferred from processing the sample set of event outcomes. Similarly, the alternative hypothesis H1 might be framed as pi>p0.
  • As noted above, alarm generation entails accumulating a relatively small sample set of event outcomes and then inferring from that data the overall failure rate of the corresponding event type. This approach requires approximating the binomial distribution of the sample set as a normal distribution. Thus, one technique determines whether the sample set accumulated thus would allow such approximation by checking N·p>5, and N·(1−p)>5 (step [0030] 104). If not, one or more additional events are accumulated (step 106), and the test conditions are re-checked. Processing may continue in this manner until enough event outcomes to satisfy the normal-curve approximation requirements are accumulated.
  • As an example, assume that sixty event outcomes have been accumulated (N=60) and that this set of event outcomes includes thirty failures (X=30). Thus, p={fraction (30/60)} or 0.5. With these values, the normal approximation tests are satisfied [0031]
  • (Np=60(0.5)=30,
  • and [0032]
  • N(1−p)=60(1−0.5)=30).
  • Once the test conditions are satisfied, processing continues with calculation of the t statistic on the desired confidence interval (or z statistic if z-score testing is used). The confidence interval may be arbitrarily set by the network operator, but an exemplary value might be ninety-five percent (0.95) for reliable alarm generation. In practice, the confidence interval may be a configurable value set as needed or desired by the network operator. The confidence interval may be expressed as, [0033]
  • p−t·s m <μ<p+t·s m,   (3)
  • where μ represents the value of interest, s[0034] m equals the estimated standard deviation, and t equals the Student's t value.
  • The estimated standard deviation s[0035] m may be determined as, s m = S N = X ( 1 - X N ) 2 + ( N - X ( X N ) 2 N - 1 N , ( 4 )
    Figure US20030064720A1-20030403-M00002
  • where X and N are, as before, the observed number of failures and the sample set size, respectively. [0036]
  • The t statistic may be found in standard look-up tables as are readily available in statistical literature, or may be calculated as follows, [0037] T + ( 1 - T 2 ) = F ( t ) = - t ( Γ ( n + 1 2 ) Γ n π · Γ ( n 2 ) ) ( 1 + x 2 n ) - ( n + 1 2 ) x , ( 5 )
    Figure US20030064720A1-20030403-M00003
  • where Γ is the Gamma function, and n equals the degrees of freedom (i.e., N−1). Also, note that the expression [0038] T + ( 1 - T 2 )
    Figure US20030064720A1-20030403-M00004
  • is used to obtain a “one-tailed” value from the “two-tailed” t-test formula. FIG. 4 illustrates the areas of interest under the normal curve associated with the two-tailed t-test. [0039]
  • It should be understood that a one- or two-tailed t-test may be performed, or that the similar z-score test may be performed with subsequent evaluations based on the z statistic rather than the t statistic. Other formulas are available for computing the t statistic and it should be understood that the [0040] processor 30 in the BSC 12 (or other processor elsewhere in the network 10) may calculate the t statistic, or obtain it using table look-up methods. With the table look-up approach, the required statistical table or tables may be stored in memory 32 or elsewhere.
  • With the above calculations, p−t·s[0041] m<μ becomes,
  • 0.5−(1.671)(0.0651)<μ,
  • which reduces to 0.39<μ (with the desired ninety-five percent confidence level). [0042]
  • Processing then continues with evaluation of the null hypothesis H[0043] 0 (step 110). If the null hypothesis is accepted, one can conclude that the observed failure rate in the sample set is consistent with the proposition that the overall failure rate for the event type of interest is below the alarm threshold set by the network operator. Conversely, if the null hypothesis is rejected, one can infer that the overall failure rate exceeds the threshold value.
  • The evaluation may be expressed according to the following query: [0044]
  • is [0045]
  • p−t·s m >p 0?  (6)
  • Substituting the computed values, the query is 0.39>0.20? The obvious answer is yes, meaning that the null hypothesis H[0046] 0 is rejected (step 112). Processing then continues with the BSC 12 setting an alarm indicator or otherwise generating alarm information (step 116). Processing may then return to a calling program or function (step 118). Alarm processing may begin again after a desired interval, or when a controlling program within the BSC software requests it.
  • Rejecting the null hypothesis H[0047] 0 when it should have been accepted is termed a “Type 1” statistical error. The probability of committing a Type 1 statistical error may be limited based on selection of the desired significance level or confidence interval as used in the above t- or z-score testing. Adopting an exemplary confidence interval of ninety-five percent reduces Type 1 errors to no more than 2.5 percent.
  • If the null hypothesis is accepted (step [0048] 112), the BSC 12 might clear any current alarm data for the corresponding event type, as well as clear the current the sample set so that the next alarm evaluation is based on newly accumulated event outcomes. Note that clearing current alarm data does not necessarily entail clearing any older alarm data for the event type that might be stored in memory 32.
  • The performance alarm information may be stored as part of the alarm data held in [0049] memory 32 and reported to the network manager 20 at the next regular alarm-reporting interval. Alternatively, the BSC 12 might immediately report the alarm condition to the network manager 20, or other appropriate supervisory network entity. The manner in which the BSC 12 chooses to report the performance alarm information may be configurable. For example, the network operator may implement alarm generation according to the above logic for a plurality of different network event types. Some event types may have a higher criticality associated with them, and thus might warrant immediate transfer of alarm information from the BSC 12 to the network manager 20. Other less critical event types might have corresponding alarm conditions reported at some predefined reporting interval.
  • FIG. 3 presents an alternative to the processing logic of FIG. 2 in that the approach to accumulating and checking the set of event outcomes is somewhat different. Processing begins (step [0050] 200) with framing the null and alternative hypotheses as before (step 202), but here the processor 30 accumulates event outcomes for a pre-defined interval (step 204). This is in contrast to the approach outlined in FIG. 2 where the processor 30 essentially accumulates event outcomes until the test conditions are satisfied.
  • Accumulating event outcomes over a defined interval has some advantages. For example, less processing overhead may be required because, instead of repeatedly evaluating (1) and (2) above, the [0051] processor 30 performs the test condition evaluations only once at the end of each accumulation interval. If the test conditions are not met (i.e., (1) and (2) are not satisfied) (step 206), the accumulated events are cleared (step 208), a new accumulation interval is started (step 210), and accumulation of event outcomes for the new accumulation interval begins anew (step 204). If the test conditions are satisfied (step 206), processing continues as with the corresponding steps in FIG. 2 above (i.e., processing continues as before with steps 212 through 222).
  • Whether the logic of FIG. 2 or that of FIG. 3., or some combination or other variation thereof is implemented, it should be understood that the network operator may design the processing flow such that any of the involved variables may be set or configured as desired. Further, it should be understood that the above processing flows may be applied to any number of communication network event types, each event type having its own configurable values, such as alarm threshold, accumulation interval, and reporting preferences (e.g., interval-based reporting or immediate reporting). [0052]
  • It is further worth noting that some event types may be better suited for monitoring in the [0053] network manager 20, or even in the RBSs 14, rather than in the BSC 12. By avoiding the need for using historical performance data, the inferential statistical testing methods of the present invention become practical across a range of network entities. Therefore, it should be appreciated that the techniques of the present invention may be implemented in one or more different entities in the communication network 10.
  • In terms of configuring the [0054] network 10 for implementation of the present invention, it may be that the network operator 10 provides or inputs alarm generation configuration information into the network manager 20. Such information may include but is not limited to desired alarm thresholds and reporting intervals. The network manager 20 may then transfer that information to the BSC 12, or to other network entities, depending on which entities are selected to perform alarm generation in accordance with the present invention. Alternatively or additionally, the network operator may directly access the particular network entities involved in alarm generation on an as needed basis.
  • Of course, those skilled in the art will be enabled by this disclosure to make various modifications and alterations to the present invention as described above. As was noted, the alarm generation techniques of the present invention may be practicably implemented in one or more of a variety of network entities, including [0055] BSCs 12, network managers 20, and RBSs 14. In some embodiments, different types of entities may generate performance alarms for different types of communication network events, depending upon which entity is best suited or positioned for monitoring a particular type of event. Further, many of the values used in the exemplary equations above are essentially arbitrary. Thus, alarm thresholds and other variables may be set or adjusted as needed or desired in a particular circumstance. In any case, the above details are exemplary and should not be construed as limiting the scope of the present invention. Indeed, the present invention is limited only by the following claims and the reasonable equivalents thereof.

Claims (62)

What is claimed is:
1. A method of alarm generation in a wireless communication network, the method comprising:
accumulating a data set of binomial outcomes for a plurality of events of a desired network event type;
inferring an outcome probability for said desired network event type from said data set using inferential statistical testing; and
generating an alarm if said outcome probability satisfies an alarm condition defined for said event type.
2. The method of claim 1 wherein accumulating the data set of binomial outcomes comprises accumulating binomial outcomes for a plurality of events of the desired network type at least until it is valid to approximate the binomial distribution of the data set as a normal distribution.
3. The method of claim 2 further comprising testing the data set to determine whether the normal distribution approximation is valid.
4. The method of claim 3 further comprising accumulating a new data set if the normal distribution approximation is not valid.
5. The method of claim 3 further comprising accumulating one or more additional binomial outcomes until testing of the data set determines that the normal distribution approximation is valid.
6. The method of claim 1 wherein accumulating a data set of binomial outcomes for a plurality of events of a desired network event type comprises recording the binomial outcome for each one of said plurality of communication network events as one of a successful outcome or a failed outcome.
7. The method of claim 1 wherein inferring an outcome probability from said data set using inferential statistical testing comprises inferring a probability of failure for said event type based on an observed incidence of failure in said data set.
8. The method of claim 7 wherein inferring a probability of failure for said event type based on an observed incidence of failure in said data set comprises performing a t-test or a z-score test.
9. The method of claim 1 wherein said alarm condition is a probability threshold, and wherein generating an alarm if said outcome probability satisfies an alarm condition defined for said event type comprises generating said alarm if said outcome probability exceeds said probability threshold.
10. The method of claim 1 wherein inferring an outcome probability for said desired network event type from said data set using inferential statistical testing comprises:
determining a desired confidence interval for performing a t-test using said data set; and
performing said t-test based on said confidence interval to determine said outcome probability.
11. The method of claim 10 wherein determining a desired confidence interval for said t-test comprises accessing a pre-determined confidence interval value.
12. The method of claim 10 further comprising calculating an estimated standard deviation for said data set in the performance of said t-test.
13. The method of claim 10 further comprising determining a t statistic for said t-test by table look-up.
14. The method of claim 10 further comprising determining a t statistic for said t-test by calculating a statistical formula.
15. The method of claim 1 further comprising performing the steps of claim 1 in a base station controller comprising a portion of said wireless communication network.
16. The method of claim 15 further comprising storing alarm information bearing on generating said alarm at said base station controller.
17. The method of claim 15 further comprising receiving said alarm information from a remote network entity.
18. The method of claim 15 further comprising reporting said alarm condition to a remote network entity.
19. The method of claim 18 wherein reporting said alarm condition comprises reporting said alarm to a network manager.
20. The method of claim 1 further comprising performing the steps of claim 1 in a radio base station comprising a portion of said wireless communication network.
21. The method of claim 1 further comprising performing the steps of claim 1 in a network manager comprising a portion of said wireless communication network.
22. The method of claim 1 further comprising generating alarms for a plurality of different types of communication network events based on inferentially determining outcome probabilities for said plurality of different types of communication network events.
23. The method of claim 22 further comprising storing an alarm threshold as said alarm condition for each of said plurality of different types of communication network events, such that the alarm condition for each event type is evaluated based on the corresponding alarm threshold.
24. The method of claim 1 further comprising defining said alarm condition as a configurable alarm threshold.
25. A method of generating performance alarms in a wireless communication network, the method comprising:
accumulating a sample set as a plurality of event outcomes for a communication event type, said event outcomes being recorded as one of an event failure and an event success;
determining a first failure rate for said plurality of event outcomes based on the number of event failures and event successes;
inferring by statistical analysis a general failure rate for said communication event type based on said first failure rate; and
determining whether an alarm condition exists based on comparing said general failure rate to an alarm threshold failure rate.
26. The method of claim 25 further comprising indicating an alarm condition if said general failure rate exceeds said alarm threshold failure rate.
27. The method of claim 25 wherein said alarm threshold failure rate comprises a pre-defined failure probability value, and wherein inferring by statistical analysis a general failure rate for said communication event type comprises determining a calculated failure probability value.
28. The method of claim 27 wherein determining whether an alarm condition exists based on comparing said general failure rate to said alarm threshold failure rate comprises comparing said calculated failure probability value to said pre-defined failure probability value.
29. The method of claim 25 wherein inferring by statistical analysis a general failure rate for said communication event type comprises performing a t-test using said sample set.
30. The method of claim 29 further comprising performing said t-test on a desired confidence interval.
31. The method of claim 29 further comprising performing said t-test as a one tail t-test.
32. The method of claim 29 further comprising performing said t-test as a two tailed t-test.
33. The method of claim 29 further comprising estimating a standard deviation for said sample set for use in performing said t-test.
34. The method of claim 25 wherein inferring by statistical analysis a general failure rate for said communication event type comprises performing one of a t-test or a z-score test using said sample set.
35. The method of claim 34 further comprising determining whether to perform a t-test or a z-score test based on one or more characteristics of said sample set.
36. The method of claim 25 wherein accumulating a sample set as a plurality of event outcomes for a communication event type comprises recording event outcomes at least until said sample set is suitable for use in inferential statistical analysis to infer said general failure rate.
37. The method of claim 36 further comprising determining whether said sample set is suitable for inferential statistical testing by evaluating one or more values determined as the product of the number of samples in said sample set and an observed incidence of failure for said sample set.
38. The method of claim 37 further comprising determining whether to use a statistical t-test or a statistical z-score test based on the number of samples in said sample set.
39. The method of claim 25 wherein accumulating a sample set as a plurality of event outcomes for a communication event type comprises accumulating event outcomes at least until a binomial distribution of said event outcomes may be approximated as a normal distribution.
40. The method of claim 25 wherein accumulating a sample set as a plurality of event outcomes for a communication event type comprises:
accumulating event outcomes for a defined accumulation interval; and
testing said sample set to determine if the binomial distribution of said event outcomes may be approximated as a normal distribution.
41. The method of claim 40 further comprising:
discarding said sample set if the normal distribution approximation cannot be used;
beginning a new accumulation interval over which a new sample set will be accumulated; and
repeating the test for normal distribution approximation after said new sample set is accumulated.
42. The method of claim 25 further comprising assuming a Student's t-distribution for said sample set, and wherein inferring by statistical analysis a general failure rate for said communication event type comprises performing a t-test on said plurality of event outcomes.
43. The method of claim 25 further comprising defining said alarm threshold failure rate as a configurable alarm threshold failure rate.
44. A network entity for use in a wireless communication network, said network entity comprising a processor to provide performance alarm generation for at least one type of communication event by:
recording a plurality of event outcomes for said communication event type, each said event outcome recorded as one of an event failure and an event success;
determining a first failure rate for said plurality of event outcomes based on the number of event failures and event successes;
inferring by statistical analysis a general failure rate for said communication event type based on said first failure rate; and
determining whether an alarm condition exists based on comparing said general failure rate to an alarm threshold failure rate.
45. The network entity of claim 44 wherein said processor infers by statistical analysis said general failure rate by performing inferential statistical testing using said plurality of event outcomes recorded.
46. The network entity of claim 45 wherein said processor performs said inferential statistical testing as a Student's t-test.
47. The network entity of claim 45 wherein said processor performs said inferential statistical testing as a z-score test.
48. The network entity of claim 44 wherein said processor accumulates event outcomes until a binomial distribution of said plurality of event outcomes may be approximated as a normal distribution.
49. The network entity of claim 44 wherein said processor accumulates event outcomes in each of one or more defined accumulation intervals until a binomial distribution of said plurality of event outcomes accumulated may be approximated as a normal distribution.
50. The network entity of claim 44 further comprising memory, and wherein said alarm threshold failure rate is stored in said memory.
51. The network entity of claim 50 wherein a plurality of said alarm threshold failure rates for a plurality of different communication event types is stored in said memory.
52. The network entity of claim 51 wherein said processor generates performance alarms for said plurality of different communication network event types based on said plurality of alarm threshold failure rates stored in said memory.
53. The network entity of claim 50 wherein said processor accumulates said event outcomes in said memory.
54. The network entity of claim 44 wherein said network entity receives said alarm threshold failure rate from a remote entity.
55. The network entity of claim 44 wherein said processor uses a confidence level used in said statistical testing, such that determination of whether said alarm condition exists is calculated with a desired confidence level.
56. The network entity of claim 44 wherein said processor generates a performance alarm for said type of communication network event if said alarm condition exists.
57. The network entity of claim 56 wherein said network entity notifies a remote entity of said alarm condition.
58. The network entity of claim 44 wherein said network entity generates performance alarms for a plurality of different types of communication events.
59. The network entity of claim 44 wherein said network entity comprises a base station controller.
60. The network entity of claim 44 wherein said network entity comprises a radio base station.
61. The network entity of claim 44 wherein said network entity comprises a network manager.
62. The network entity of claim 44 where said processor uses a configurable alarm threshold failure rate.
US09/971,305 2001-10-03 2001-10-03 System and method for generating communication network performance alarms Abandoned US20030064720A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/971,305 US20030064720A1 (en) 2001-10-03 2001-10-03 System and method for generating communication network performance alarms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/971,305 US20030064720A1 (en) 2001-10-03 2001-10-03 System and method for generating communication network performance alarms

Publications (1)

Publication Number Publication Date
US20030064720A1 true US20030064720A1 (en) 2003-04-03

Family

ID=25518189

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/971,305 Abandoned US20030064720A1 (en) 2001-10-03 2001-10-03 System and method for generating communication network performance alarms

Country Status (1)

Country Link
US (1) US20030064720A1 (en)

Cited By (70)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030218538A1 (en) * 2002-05-24 2003-11-27 Cingular Wireless, L.L.C. System and method for alarm monitoring
US20030219018A1 (en) * 2002-05-21 2003-11-27 Koninklijke Kpn N.V. System, tool and method for network monitoring and corresponding network
US20040098610A1 (en) * 2002-06-03 2004-05-20 Hrastar Scott E. Systems and methods for automated network policy exception detection and correction
US20040098457A1 (en) * 2002-01-03 2004-05-20 Stephane Betge-Brezetz Transport network management system based on trend analysis
US20040204906A1 (en) * 2003-03-31 2004-10-14 Diane Lambert Method and apparatus for event monitoring in an information processing system
US20040210654A1 (en) * 2003-04-21 2004-10-21 Hrastar Scott E. Systems and methods for determining wireless network topology
US20040209617A1 (en) * 2003-04-21 2004-10-21 Hrastar Scott E. Systems and methods for wireless network site survey systems and methods
US20040209634A1 (en) * 2003-04-21 2004-10-21 Hrastar Scott E. Systems and methods for adaptively scanning for wireless communications
US20040218602A1 (en) * 2003-04-21 2004-11-04 Hrastar Scott E. Systems and methods for dynamic sensor discovery and selection
US20050096049A1 (en) * 2003-10-31 2005-05-05 Burch Jefferson B. Bandwidth management using statistical measurement
EP1638253A1 (en) * 2004-09-21 2006-03-22 Lucent Technologies Inc. Method of monitoring wireless network performance
US20060085543A1 (en) * 2004-10-19 2006-04-20 Airdefense, Inc. Personal wireless monitoring agent
US20060123133A1 (en) * 2004-10-19 2006-06-08 Hrastar Scott E Detecting unauthorized wireless devices on a wired network
WO2006129792A1 (en) * 2005-06-02 2006-12-07 Nec Corporation Abnormality detecting method and system, and upkeep method and system
US20070025528A1 (en) * 2005-07-07 2007-02-01 Sbc Knowledge Ventures, L.P. System and method for automated performance monitoring for a call servicing system
US20070094741A1 (en) * 2002-05-20 2007-04-26 Airdefense, Inc. Active Defense Against Wireless Intruders
US20070189194A1 (en) * 2002-05-20 2007-08-16 Airdefense, Inc. Method and System for Wireless LAN Dynamic Channel Change with Honeypot Trap
US20070218874A1 (en) * 2006-03-17 2007-09-20 Airdefense, Inc. Systems and Methods For Wireless Network Forensics
US20070217371A1 (en) * 2006-03-17 2007-09-20 Airdefense, Inc. Systems and Methods for Wireless Security Using Distributed Collaboration of Wireless Clients
US20080052779A1 (en) * 2006-08-11 2008-02-28 Airdefense, Inc. Methods and Systems For Wired Equivalent Privacy and Wi-Fi Protected Access Protection
US20080052393A1 (en) * 2006-08-22 2008-02-28 Mcnaughton James L System and method for remotely controlling network operators
US20080049640A1 (en) * 2006-08-22 2008-02-28 Heinz John M System and method for provisioning resources of a packet network based on collected network performance information
US20080049650A1 (en) * 2006-08-22 2008-02-28 Coppage Carl M System and method for managing radio frequency windows
US20080049775A1 (en) * 2006-08-22 2008-02-28 Morrill Robert J System and method for monitoring and optimizing network performance with vector performance tables and engines
US20080049753A1 (en) * 2006-08-22 2008-02-28 Heinze John M System and method for load balancing network resources using a connection admission control engine
US20080095049A1 (en) * 2006-10-19 2008-04-24 Embarq Holdings Company, Llc System and method for establishing a communications session with an end-user based on the state of a network connection
US20080095173A1 (en) * 2006-10-19 2008-04-24 Embarq Holdings Company, Llc System and method for monitoring the connection of an end-user to a remote network
US20080167846A1 (en) * 2006-10-25 2008-07-10 Embarq Holdings Company, Llc System and method for regulating messages between networks
US20090021343A1 (en) * 2006-05-10 2009-01-22 Airdefense, Inc. RFID Intrusion Protection System and Methods
US20090098861A1 (en) * 2005-03-23 2009-04-16 Janne Kalliola Centralised Management for a Set of Network Nodes
US20090164214A1 (en) * 2007-12-21 2009-06-25 Assaf Baciu System, method and software program for enabling communications between customer service agents and users of communication devices
US7715800B2 (en) 2006-01-13 2010-05-11 Airdefense, Inc. Systems and methods for wireless intrusion detection using spectral analysis
WO2011069546A1 (en) * 2009-12-10 2011-06-16 Telefonaktiebolaget Lm Ericsson (Publ) A method of and an operating support system for providing performance management in a mobile telecommunications system
US7970013B2 (en) 2006-06-16 2011-06-28 Airdefense, Inc. Systems and methods for wireless network content filtering
US8107366B2 (en) 2006-08-22 2012-01-31 Embarq Holdings Company, LP System and method for using centralized network performance tables to manage network communications
US8111692B2 (en) 2007-05-31 2012-02-07 Embarq Holdings Company Llc System and method for modifying network traffic
US8125897B2 (en) 2006-08-22 2012-02-28 Embarq Holdings Company Lp System and method for monitoring and optimizing network performance with user datagram protocol network performance information packets
US8130793B2 (en) 2006-08-22 2012-03-06 Embarq Holdings Company, Llc System and method for enabling reciprocal billing for different types of communications over a packet network
US8144586B2 (en) 2006-08-22 2012-03-27 Embarq Holdings Company, Llc System and method for controlling network bandwidth with a connection admission control engine
US8170544B1 (en) * 2006-07-25 2012-05-01 Sprint Spectrum L.P. Method and system for integrated management of base transceiver station (BTS) with wireless backhaul
US8184549B2 (en) 2006-06-30 2012-05-22 Embarq Holdings Company, LLP System and method for selecting network egress
US8194555B2 (en) 2006-08-22 2012-06-05 Embarq Holdings Company, Llc System and method for using distributed network performance information tables to manage network communications
US8199653B2 (en) 2006-08-22 2012-06-12 Embarq Holdings Company, Llc System and method for communicating network performance information over a packet network
US8213366B2 (en) 2006-08-22 2012-07-03 Embarq Holdings Company, Llc System and method for monitoring and optimizing network performance to a wireless device
US8228791B2 (en) 2006-08-22 2012-07-24 Embarq Holdings Company, Llc System and method for routing communications between packet networks based on intercarrier agreements
US8238253B2 (en) 2006-08-22 2012-08-07 Embarq Holdings Company, Llc System and method for monitoring interlayer devices and optimizing network performance
US8274905B2 (en) 2006-08-22 2012-09-25 Embarq Holdings Company, Llc System and method for displaying a graph representative of network performance over a time period
US8280030B2 (en) 2005-06-03 2012-10-02 At&T Intellectual Property I, Lp Call routing system and method of using the same
US8331919B1 (en) * 2009-04-24 2012-12-11 Nuance Communications, Inc. System, method, and software program product for tracking call failures on a wireless phone
US8358580B2 (en) 2006-08-22 2013-01-22 Centurylink Intellectual Property Llc System and method for adjusting the window size of a TCP packet through network elements
US8374090B2 (en) 2006-08-22 2013-02-12 Centurylink Intellectual Property Llc System and method for routing data on a packet network
US8407765B2 (en) 2006-08-22 2013-03-26 Centurylink Intellectual Property Llc System and method for restricting access to network performance information tables
US8488447B2 (en) 2006-06-30 2013-07-16 Centurylink Intellectual Property Llc System and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance
US8531954B2 (en) 2006-08-22 2013-09-10 Centurylink Intellectual Property Llc System and method for handling reservation requests with a connection admission control engine
US8537695B2 (en) 2006-08-22 2013-09-17 Centurylink Intellectual Property Llc System and method for establishing a call being received by a trunk on a packet network
US8549405B2 (en) 2006-08-22 2013-10-01 Centurylink Intellectual Property Llc System and method for displaying a graphical representation of a network to identify nodes and node segments on the network that are not operating normally
US8565738B2 (en) 2006-12-08 2013-10-22 Nuance Communications, Inc. Software program and method for offering promotions on a phone
US8576722B2 (en) 2006-08-22 2013-11-05 Centurylink Intellectual Property Llc System and method for modifying connectivity fault management packets
US8619600B2 (en) 2006-08-22 2013-12-31 Centurylink Intellectual Property Llc System and method for establishing calls over a call path having best path metrics
US8717911B2 (en) 2006-06-30 2014-05-06 Centurylink Intellectual Property Llc System and method for collecting network performance information
US8743703B2 (en) 2006-08-22 2014-06-03 Centurylink Intellectual Property Llc System and method for tracking application resource usage
US8750158B2 (en) 2006-08-22 2014-06-10 Centurylink Intellectual Property Llc System and method for differentiated billing
US8751232B2 (en) 2004-08-12 2014-06-10 At&T Intellectual Property I, L.P. System and method for targeted tuning of a speech recognition system
US8824659B2 (en) 2005-01-10 2014-09-02 At&T Intellectual Property I, L.P. System and method for speech-enabled call routing
US8824651B2 (en) 2006-09-28 2014-09-02 Nuance Communications, Inc. System and method for performing an action on a phone in response to a user initiating an outbound call to one or more select phone numbers
US8879391B2 (en) 2008-04-09 2014-11-04 Centurylink Intellectual Property Llc System and method for using network derivations to determine path states
US9094257B2 (en) 2006-06-30 2015-07-28 Centurylink Intellectual Property Llc System and method for selecting a content delivery network
US9112972B2 (en) 2004-12-06 2015-08-18 Interactions Llc System and method for processing speech
US9479341B2 (en) 2006-08-22 2016-10-25 Centurylink Intellectual Property Llc System and method for initiating diagnostics on a packet network node
US9621361B2 (en) 2006-08-22 2017-04-11 Centurylink Intellectual Property Llc Pin-hole firewall for communicating data packets on a packet network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5748098A (en) * 1993-02-23 1998-05-05 British Telecommunications Public Limited Company Event correlation
US6147974A (en) * 1997-03-04 2000-11-14 Kokusai Denshin Denwa Co., Ltd. Apparatus for monitoring state of traffic in telecommunication network
US20040078171A1 (en) * 2001-04-10 2004-04-22 Smartsignal Corporation Diagnostic systems and methods for predictive condition monitoring

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5748098A (en) * 1993-02-23 1998-05-05 British Telecommunications Public Limited Company Event correlation
US6147974A (en) * 1997-03-04 2000-11-14 Kokusai Denshin Denwa Co., Ltd. Apparatus for monitoring state of traffic in telecommunication network
US20040078171A1 (en) * 2001-04-10 2004-04-22 Smartsignal Corporation Diagnostic systems and methods for predictive condition monitoring

Cited By (148)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040098457A1 (en) * 2002-01-03 2004-05-20 Stephane Betge-Brezetz Transport network management system based on trend analysis
US7779476B2 (en) 2002-05-20 2010-08-17 Airdefense, Inc. Active defense against wireless intruders
US20070189194A1 (en) * 2002-05-20 2007-08-16 Airdefense, Inc. Method and System for Wireless LAN Dynamic Channel Change with Honeypot Trap
US20070192870A1 (en) * 2002-05-20 2007-08-16 Airdefense, Inc., A Georgia Corporation Method and system for actively defending a wireless LAN against attacks
US20070094741A1 (en) * 2002-05-20 2007-04-26 Airdefense, Inc. Active Defense Against Wireless Intruders
US8060939B2 (en) 2002-05-20 2011-11-15 Airdefense, Inc. Method and system for securing wireless local area networks
US20030219018A1 (en) * 2002-05-21 2003-11-27 Koninklijke Kpn N.V. System, tool and method for network monitoring and corresponding network
US7466672B2 (en) * 2002-05-21 2008-12-16 Koninklijke Kpn N.V. System, tool and method for network monitoring and corresponding network
US20090086649A1 (en) * 2002-05-21 2009-04-02 Koninklijke Kpn N.V. System, tool and method for network monitoring and corresponding network
US20030218538A1 (en) * 2002-05-24 2003-11-27 Cingular Wireless, L.L.C. System and method for alarm monitoring
US7053763B2 (en) 2002-05-24 2006-05-30 Cingular Wireless Ii, Llc System and method for alarm monitoring
US20040098610A1 (en) * 2002-06-03 2004-05-20 Hrastar Scott E. Systems and methods for automated network policy exception detection and correction
US7016806B2 (en) * 2003-03-31 2006-03-21 Lucent Technologies Inc. Method and apparatus for event monitoring in an information processing system
US20040204906A1 (en) * 2003-03-31 2004-10-14 Diane Lambert Method and apparatus for event monitoring in an information processing system
US20040218602A1 (en) * 2003-04-21 2004-11-04 Hrastar Scott E. Systems and methods for dynamic sensor discovery and selection
US20040209634A1 (en) * 2003-04-21 2004-10-21 Hrastar Scott E. Systems and methods for adaptively scanning for wireless communications
US20040209617A1 (en) * 2003-04-21 2004-10-21 Hrastar Scott E. Systems and methods for wireless network site survey systems and methods
US20040210654A1 (en) * 2003-04-21 2004-10-21 Hrastar Scott E. Systems and methods for determining wireless network topology
US20050096049A1 (en) * 2003-10-31 2005-05-05 Burch Jefferson B. Bandwidth management using statistical measurement
US7209710B2 (en) * 2003-10-31 2007-04-24 Agilent Technologies, Inc. Bandwidth management in a wireless measurement system using statistical processing of measurement data
US9368111B2 (en) 2004-08-12 2016-06-14 Interactions Llc System and method for targeted tuning of a speech recognition system
US8751232B2 (en) 2004-08-12 2014-06-10 At&T Intellectual Property I, L.P. System and method for targeted tuning of a speech recognition system
EP1638253A1 (en) * 2004-09-21 2006-03-22 Lucent Technologies Inc. Method of monitoring wireless network performance
US20060063521A1 (en) * 2004-09-21 2006-03-23 Benjamin Cheung Method of monitoring wireless network performance
US20060085543A1 (en) * 2004-10-19 2006-04-20 Airdefense, Inc. Personal wireless monitoring agent
US20060123133A1 (en) * 2004-10-19 2006-06-08 Hrastar Scott E Detecting unauthorized wireless devices on a wired network
US8196199B2 (en) 2004-10-19 2012-06-05 Airdefense, Inc. Personal wireless monitoring agent
US9350862B2 (en) 2004-12-06 2016-05-24 Interactions Llc System and method for processing speech
US9112972B2 (en) 2004-12-06 2015-08-18 Interactions Llc System and method for processing speech
US8824659B2 (en) 2005-01-10 2014-09-02 At&T Intellectual Property I, L.P. System and method for speech-enabled call routing
US9088652B2 (en) 2005-01-10 2015-07-21 At&T Intellectual Property I, L.P. System and method for speech-enabled call routing
US7995519B2 (en) * 2005-03-23 2011-08-09 Airwide Solutions Oy Centralised management for a set of network nodes
US20090098861A1 (en) * 2005-03-23 2009-04-16 Janne Kalliola Centralised Management for a Set of Network Nodes
WO2006129792A1 (en) * 2005-06-02 2006-12-07 Nec Corporation Abnormality detecting method and system, and upkeep method and system
US8611228B2 (en) 2005-06-02 2013-12-17 Nec Corporation Anomaly detection method and system and maintenance method and system
US20090052330A1 (en) * 2005-06-02 2009-02-26 Nec Corporation Anomaly detection method and system and maintenance method and system
US8280030B2 (en) 2005-06-03 2012-10-02 At&T Intellectual Property I, Lp Call routing system and method of using the same
US8619966B2 (en) 2005-06-03 2013-12-31 At&T Intellectual Property I, L.P. Call routing system and method of using the same
US20070025528A1 (en) * 2005-07-07 2007-02-01 Sbc Knowledge Ventures, L.P. System and method for automated performance monitoring for a call servicing system
US8175253B2 (en) * 2005-07-07 2012-05-08 At&T Intellectual Property I, L.P. System and method for automated performance monitoring for a call servicing system
US7715800B2 (en) 2006-01-13 2010-05-11 Airdefense, Inc. Systems and methods for wireless intrusion detection using spectral analysis
US20070217371A1 (en) * 2006-03-17 2007-09-20 Airdefense, Inc. Systems and Methods for Wireless Security Using Distributed Collaboration of Wireless Clients
US7971251B2 (en) 2006-03-17 2011-06-28 Airdefense, Inc. Systems and methods for wireless security using distributed collaboration of wireless clients
US20070218874A1 (en) * 2006-03-17 2007-09-20 Airdefense, Inc. Systems and Methods For Wireless Network Forensics
US20090021343A1 (en) * 2006-05-10 2009-01-22 Airdefense, Inc. RFID Intrusion Protection System and Methods
US7970013B2 (en) 2006-06-16 2011-06-28 Airdefense, Inc. Systems and methods for wireless network content filtering
US9054915B2 (en) 2006-06-30 2015-06-09 Centurylink Intellectual Property Llc System and method for adjusting CODEC speed in a transmission path during call set-up due to reduced transmission performance
US8184549B2 (en) 2006-06-30 2012-05-22 Embarq Holdings Company, LLP System and method for selecting network egress
US10560494B2 (en) 2006-06-30 2020-02-11 Centurylink Intellectual Property Llc Managing voice over internet protocol (VoIP) communications
US10230788B2 (en) 2006-06-30 2019-03-12 Centurylink Intellectual Property Llc System and method for selecting a content delivery network
US9838440B2 (en) 2006-06-30 2017-12-05 Centurylink Intellectual Property Llc Managing voice over internet protocol (VoIP) communications
US9749399B2 (en) 2006-06-30 2017-08-29 Centurylink Intellectual Property Llc System and method for selecting a content delivery network
US9549004B2 (en) 2006-06-30 2017-01-17 Centurylink Intellectual Property Llc System and method for re-routing calls
US8477614B2 (en) 2006-06-30 2013-07-02 Centurylink Intellectual Property Llc System and method for routing calls if potential call paths are impaired or congested
US8488447B2 (en) 2006-06-30 2013-07-16 Centurylink Intellectual Property Llc System and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance
US8570872B2 (en) 2006-06-30 2013-10-29 Centurylink Intellectual Property Llc System and method for selecting network ingress and egress
US9154634B2 (en) 2006-06-30 2015-10-06 Centurylink Intellectual Property Llc System and method for managing network communications
US9118583B2 (en) 2006-06-30 2015-08-25 Centurylink Intellectual Property Llc System and method for re-routing calls
US9094257B2 (en) 2006-06-30 2015-07-28 Centurylink Intellectual Property Llc System and method for selecting a content delivery network
US8976665B2 (en) 2006-06-30 2015-03-10 Centurylink Intellectual Property Llc System and method for re-routing calls
US8717911B2 (en) 2006-06-30 2014-05-06 Centurylink Intellectual Property Llc System and method for collecting network performance information
US8170544B1 (en) * 2006-07-25 2012-05-01 Sprint Spectrum L.P. Method and system for integrated management of base transceiver station (BTS) with wireless backhaul
US8281392B2 (en) 2006-08-11 2012-10-02 Airdefense, Inc. Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
US20080052779A1 (en) * 2006-08-11 2008-02-28 Airdefense, Inc. Methods and Systems For Wired Equivalent Privacy and Wi-Fi Protected Access Protection
US8743703B2 (en) 2006-08-22 2014-06-03 Centurylink Intellectual Property Llc System and method for tracking application resource usage
US20080052393A1 (en) * 2006-08-22 2008-02-28 Mcnaughton James L System and method for remotely controlling network operators
US8238253B2 (en) 2006-08-22 2012-08-07 Embarq Holdings Company, Llc System and method for monitoring interlayer devices and optimizing network performance
US8274905B2 (en) 2006-08-22 2012-09-25 Embarq Holdings Company, Llc System and method for displaying a graph representative of network performance over a time period
US10469385B2 (en) 2006-08-22 2019-11-05 Centurylink Intellectual Property Llc System and method for improving network performance using a connection admission control engine
US8224255B2 (en) 2006-08-22 2012-07-17 Embarq Holdings Company, Llc System and method for managing radio frequency windows
US10298476B2 (en) 2006-08-22 2019-05-21 Centurylink Intellectual Property Llc System and method for tracking application resource usage
US8307065B2 (en) 2006-08-22 2012-11-06 Centurylink Intellectual Property Llc System and method for remotely controlling network operators
US8125897B2 (en) 2006-08-22 2012-02-28 Embarq Holdings Company Lp System and method for monitoring and optimizing network performance with user datagram protocol network performance information packets
US8358580B2 (en) 2006-08-22 2013-01-22 Centurylink Intellectual Property Llc System and method for adjusting the window size of a TCP packet through network elements
US8374090B2 (en) 2006-08-22 2013-02-12 Centurylink Intellectual Property Llc System and method for routing data on a packet network
US8407765B2 (en) 2006-08-22 2013-03-26 Centurylink Intellectual Property Llc System and method for restricting access to network performance information tables
US10075351B2 (en) 2006-08-22 2018-09-11 Centurylink Intellectual Property Llc System and method for improving network performance
US8472326B2 (en) 2006-08-22 2013-06-25 Centurylink Intellectual Property Llc System and method for monitoring interlayer devices and optimizing network performance
US8223654B2 (en) 2006-08-22 2012-07-17 Embarq Holdings Company, Llc Application-specific integrated circuit for monitoring and optimizing interlayer network performance
US8488495B2 (en) 2006-08-22 2013-07-16 Centurylink Intellectual Property Llc System and method for routing communications between packet networks based on real time pricing
US8223655B2 (en) 2006-08-22 2012-07-17 Embarq Holdings Company, Llc System and method for provisioning resources of a packet network based on collected network performance information
US8509082B2 (en) 2006-08-22 2013-08-13 Centurylink Intellectual Property Llc System and method for load balancing network resources using a connection admission control engine
US8520603B2 (en) 2006-08-22 2013-08-27 Centurylink Intellectual Property Llc System and method for monitoring and optimizing network performance to a wireless device
US8531954B2 (en) 2006-08-22 2013-09-10 Centurylink Intellectual Property Llc System and method for handling reservation requests with a connection admission control engine
US8537695B2 (en) 2006-08-22 2013-09-17 Centurylink Intellectual Property Llc System and method for establishing a call being received by a trunk on a packet network
US8549405B2 (en) 2006-08-22 2013-10-01 Centurylink Intellectual Property Llc System and method for displaying a graphical representation of a network to identify nodes and node segments on the network that are not operating normally
US9992348B2 (en) 2006-08-22 2018-06-05 Century Link Intellectual Property LLC System and method for establishing a call on a packet network
US8213366B2 (en) 2006-08-22 2012-07-03 Embarq Holdings Company, Llc System and method for monitoring and optimizing network performance to a wireless device
US8576722B2 (en) 2006-08-22 2013-11-05 Centurylink Intellectual Property Llc System and method for modifying connectivity fault management packets
US9929923B2 (en) 2006-08-22 2018-03-27 Centurylink Intellectual Property Llc System and method for provisioning resources of a packet network based on collected network performance information
US8619820B2 (en) 2006-08-22 2013-12-31 Centurylink Intellectual Property Llc System and method for enabling communications over a number of packet networks
US8619600B2 (en) 2006-08-22 2013-12-31 Centurylink Intellectual Property Llc System and method for establishing calls over a call path having best path metrics
US8130793B2 (en) 2006-08-22 2012-03-06 Embarq Holdings Company, Llc System and method for enabling reciprocal billing for different types of communications over a packet network
US8619596B2 (en) 2006-08-22 2013-12-31 Centurylink Intellectual Property Llc System and method for using centralized network performance tables to manage network communications
US8670313B2 (en) 2006-08-22 2014-03-11 Centurylink Intellectual Property Llc System and method for adjusting the window size of a TCP packet through network elements
US8687614B2 (en) 2006-08-22 2014-04-01 Centurylink Intellectual Property Llc System and method for adjusting radio frequency parameters
US8199653B2 (en) 2006-08-22 2012-06-12 Embarq Holdings Company, Llc System and method for communicating network performance information over a packet network
US8107366B2 (en) 2006-08-22 2012-01-31 Embarq Holdings Company, LP System and method for using centralized network performance tables to manage network communications
US8743700B2 (en) 2006-08-22 2014-06-03 Centurylink Intellectual Property Llc System and method for provisioning resources of a packet network based on collected network performance information
US8750158B2 (en) 2006-08-22 2014-06-10 Centurylink Intellectual Property Llc System and method for differentiated billing
US9832090B2 (en) 2006-08-22 2017-11-28 Centurylink Intellectual Property Llc System, method for compiling network performancing information for communications with customer premise equipment
US9813320B2 (en) 2006-08-22 2017-11-07 Centurylink Intellectual Property Llc System and method for generating a graphical user interface representative of network performance
US8811160B2 (en) 2006-08-22 2014-08-19 Centurylink Intellectual Property Llc System and method for routing data on a packet network
US20080049753A1 (en) * 2006-08-22 2008-02-28 Heinze John M System and method for load balancing network resources using a connection admission control engine
US9806972B2 (en) 2006-08-22 2017-10-31 Centurylink Intellectual Property Llc System and method for monitoring and altering performance of a packet network
US8144587B2 (en) 2006-08-22 2012-03-27 Embarq Holdings Company, Llc System and method for load balancing network resources using a connection admission control engine
US9712445B2 (en) 2006-08-22 2017-07-18 Centurylink Intellectual Property Llc System and method for routing data on a packet network
US9661514B2 (en) 2006-08-22 2017-05-23 Centurylink Intellectual Property Llc System and method for adjusting communication parameters
US9014204B2 (en) 2006-08-22 2015-04-21 Centurylink Intellectual Property Llc System and method for managing network communications
US9042370B2 (en) 2006-08-22 2015-05-26 Centurylink Intellectual Property Llc System and method for establishing calls over a call path having best path metrics
US9054986B2 (en) 2006-08-22 2015-06-09 Centurylink Intellectual Property Llc System and method for enabling communications over a number of packet networks
US20080049775A1 (en) * 2006-08-22 2008-02-28 Morrill Robert J System and method for monitoring and optimizing network performance with vector performance tables and engines
US20080049650A1 (en) * 2006-08-22 2008-02-28 Coppage Carl M System and method for managing radio frequency windows
US8194555B2 (en) 2006-08-22 2012-06-05 Embarq Holdings Company, Llc System and method for using distributed network performance information tables to manage network communications
US9094261B2 (en) 2006-08-22 2015-07-28 Centurylink Intellectual Property Llc System and method for establishing a call being received by a trunk on a packet network
US20080049640A1 (en) * 2006-08-22 2008-02-28 Heinz John M System and method for provisioning resources of a packet network based on collected network performance information
US9112734B2 (en) 2006-08-22 2015-08-18 Centurylink Intellectual Property Llc System and method for generating a graphical user interface representative of network performance
US9660917B2 (en) 2006-08-22 2017-05-23 Centurylink Intellectual Property Llc System and method for remotely controlling network operators
US9621361B2 (en) 2006-08-22 2017-04-11 Centurylink Intellectual Property Llc Pin-hole firewall for communicating data packets on a packet network
US9225646B2 (en) 2006-08-22 2015-12-29 Centurylink Intellectual Property Llc System and method for improving network performance using a connection admission control engine
US9225609B2 (en) 2006-08-22 2015-12-29 Centurylink Intellectual Property Llc System and method for remotely controlling network operators
US9240906B2 (en) 2006-08-22 2016-01-19 Centurylink Intellectual Property Llc System and method for monitoring and altering performance of a packet network
US9241271B2 (en) 2006-08-22 2016-01-19 Centurylink Intellectual Property Llc System and method for restricting access to network performance information
US9241277B2 (en) 2006-08-22 2016-01-19 Centurylink Intellectual Property Llc System and method for monitoring and optimizing network performance to a wireless device
US9253661B2 (en) 2006-08-22 2016-02-02 Centurylink Intellectual Property Llc System and method for modifying connectivity fault management packets
US8228791B2 (en) 2006-08-22 2012-07-24 Embarq Holdings Company, Llc System and method for routing communications between packet networks based on intercarrier agreements
US8102770B2 (en) * 2006-08-22 2012-01-24 Embarq Holdings Company, LP System and method for monitoring and optimizing network performance with vector performance tables and engines
US9602265B2 (en) 2006-08-22 2017-03-21 Centurylink Intellectual Property Llc System and method for handling communications requests
US9479341B2 (en) 2006-08-22 2016-10-25 Centurylink Intellectual Property Llc System and method for initiating diagnostics on a packet network node
US8144586B2 (en) 2006-08-22 2012-03-27 Embarq Holdings Company, Llc System and method for controlling network bandwidth with a connection admission control engine
US8824651B2 (en) 2006-09-28 2014-09-02 Nuance Communications, Inc. System and method for performing an action on a phone in response to a user initiating an outbound call to one or more select phone numbers
US20080095049A1 (en) * 2006-10-19 2008-04-24 Embarq Holdings Company, Llc System and method for establishing a communications session with an end-user based on the state of a network connection
US8289965B2 (en) 2006-10-19 2012-10-16 Embarq Holdings Company, Llc System and method for establishing a communications session with an end-user based on the state of a network connection
US8194643B2 (en) 2006-10-19 2012-06-05 Embarq Holdings Company, Llc System and method for monitoring the connection of an end-user to a remote network
US20080095173A1 (en) * 2006-10-19 2008-04-24 Embarq Holdings Company, Llc System and method for monitoring the connection of an end-user to a remote network
US8189468B2 (en) 2006-10-25 2012-05-29 Embarq Holdings, Company, LLC System and method for regulating messages between networks
US9521150B2 (en) 2006-10-25 2016-12-13 Centurylink Intellectual Property Llc System and method for automatically regulating messages between networks
US20080167846A1 (en) * 2006-10-25 2008-07-10 Embarq Holdings Company, Llc System and method for regulating messages between networks
US8565738B2 (en) 2006-12-08 2013-10-22 Nuance Communications, Inc. Software program and method for offering promotions on a phone
US8111692B2 (en) 2007-05-31 2012-02-07 Embarq Holdings Company Llc System and method for modifying network traffic
US9386154B2 (en) 2007-12-21 2016-07-05 Nuance Communications, Inc. System, method and software program for enabling communications between customer service agents and users of communication devices
US20090164214A1 (en) * 2007-12-21 2009-06-25 Assaf Baciu System, method and software program for enabling communications between customer service agents and users of communication devices
US8879391B2 (en) 2008-04-09 2014-11-04 Centurylink Intellectual Property Llc System and method for using network derivations to determine path states
US8929883B2 (en) * 2009-04-24 2015-01-06 Nuance Communications, Inc. System, method, and software program product for tracking call failures on a wireless phone
US20130078992A1 (en) * 2009-04-24 2013-03-28 Nuance Communications, Inc. System, method, and software program product for tracking call failures on a wireless phone
US8331919B1 (en) * 2009-04-24 2012-12-11 Nuance Communications, Inc. System, method, and software program product for tracking call failures on a wireless phone
US8781463B2 (en) 2009-12-10 2014-07-15 Telefonaktiebolaget L M Ericsson (Publ) Method of and an operating support system for providing performance management in a Mobile telecommunications system
WO2011069546A1 (en) * 2009-12-10 2011-06-16 Telefonaktiebolaget Lm Ericsson (Publ) A method of and an operating support system for providing performance management in a mobile telecommunications system

Similar Documents

Publication Publication Date Title
US20030064720A1 (en) System and method for generating communication network performance alarms
US9900790B1 (en) Prediction of performance indicators in cellular networks
US8611228B2 (en) Anomaly detection method and system and maintenance method and system
US6182022B1 (en) Automated adaptive baselining and thresholding method and system
US8144599B2 (en) Binary class based analysis and monitoring
US6973415B1 (en) System and method for monitoring and modeling system performance
US7082381B1 (en) Method for performance monitoring and modeling
US20080177698A1 (en) Performance Degradation Root Cause Prediction in a Distributed Computing System
US20010036825A1 (en) Cellular/PCS management system and method
US20090193436A1 (en) Alarm display system of cluster storage system and method thereof
KR20080055744A (en) A telecommuncations-based link monitoring system
US11770199B2 (en) Traffic data self-recovery processing method, readable storage medium, server and apparatus
US7197428B1 (en) Method for performance monitoring and modeling
US7369967B1 (en) System and method for monitoring and modeling system performance
EP3272068A1 (en) Building and applying operational experiences for cm operations
US20080144488A1 (en) Method and System for Providing Prioritized Failure Announcements
US20180217912A1 (en) Mechanism for monitoring and alerts of computer systems applications
US7617313B1 (en) Metric transport and database load
US7120633B1 (en) Method and system for automated handling of alarms from a fault management system for a telecommunications network
CN114118991A (en) Third-party system monitoring system, method, device, equipment and storage medium
CN107451039B (en) Method and device for evaluating execution devices in cluster
CN104364664A (en) An algorithm and structure for creation, definition, and execution of an SPC rule decision tree
KR100269337B1 (en) Knowledge-based cell supervision method
US20100153543A1 (en) Method and System for Intelligent Management of Performance Measurements In Communication Networks
CN113079063A (en) Offline judgment method, system and device for charging device and computer storage medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), SWEDEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VALINS, DANIEL;RUTH, TODD;COCHRAN, PHILIP;REEL/FRAME:012444/0892

Effective date: 20011004

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION